A Survey on Web Penetration Test
Total Page:16
File Type:pdf, Size:1020Kb
ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 6, No.12 , November 2014 ISSN : 2322-5157 www.ACSIJ.org A survey on web penetration test Mahin Mirjalili1, Alireza Nowroozi2, Mitra Alidoosti3 1Department of information security, Malek-Ashtar university of technology, Tehran, Iran [email protected] 2Department of information security, Malek-Ashtar university of technology, Tehran, Iran [email protected] 3Department of information security, Malek-Ashtar university of technology, Tehran, Iran [email protected] Abstract - How the penetration test is performed? This paper reviews the penetration test specifically in the - What are types of penetration test? field of web. For this purpose, it first reviews articles generally on penetration test and its associated methods. - How the penetration test is done automatically? Then articles in the field of web penetration test are - What tools can we use to perform an automatic examined in three aspects: comparing automatic penetration test tools, introduction of new methods or tools penetration test? for manual penetration test, and articles that presented a test - Comparison of tools and their effectiveness environment for training or checking various instruments and methods. This article studied 4 different methodologies - What are the new tools and methods and what for web penetration test, 13 articles for comparing web are their features? vulnerability scanners, 10 articles that proposed a new method or tool for penetration test and 4 test environments. - How can we examine various tools and techniques? Keywords: Penetration test, web scanner, web This paper attempts to answer these questions by application, web vulnerabilities. examining 4 different methodologies for penetration test, 13 articles for comparing web vulnerability 1. Introduction scanners, 10 articles that proposed a new method or Penetration test is a security evaluation process for tool for penetration test and 4 test environments. network or computer systems that simulates an attack by an ethical hacker. The most important distinction Due to the large volume of papers in the studied area, between a hacker and a penetration tester is that some criteria were used for paper selection such as penetration test is done with a license and a signed covering a wide time period from 2006 to 2014 and contract with an organization or company, and the the number of citations per paper. Most selected output is provided as a report. The goal of penetration articles were considered by many authors in previous test is to increase data security. Security information years. and weaknesses that are specified in penetration test We will initially review articles that provided a are considered confidential and shall not be disclosed method for the penetration test, then papers in the until complete resolution of defects. field of web penetration test in three views: Given the importance of web application security, Articles on the comparison of existing methods this article reviews studies in the field of penetration test, particularly web penetration test. and tools for web penetration test. Articles that proposed a new tool or method for Questions that engaged the mind of researchers in the field of penetration test can be expressed as follows: web penetration test. 107 Copyright (c) 2014 Advances in Computer Science: an International Journal. All Rights Reserved. ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 6, No.12 , November 2014 ISSN : 2322-5157 www.ACSIJ.org Studies that proposed a test environment for Table 1- manual vs. automated penetration testing MANUAL AUTOMATED testing tools and ideas. Testing Labor-intensive, Fast, easy and safe. Process inconsistent and error Eliminates errors and 2. Penetration testing -prone, with no tedious manual tasks. specific quality Centralized and standards. standardized to 2.1. History and Importance Requires many produce consistent and Penetration testing is one of the oldest methods for disparate tools. repeatable results. assessing the security of a computer system. In the Results can vary Easy to use and early 1970's, the Department of Defense used this significantly from provides clear, method to demonstrate the security weaknesses in test to test. actionable reports. computer systems and to initiate the development of Generally requires programs to create more secure systems. Penetration highly-paid, testing is increasingly used by organizations to assure experienced security the security of Information systems and services, so personnel to run and interpret tests. that security weaknesses can be fixed before they get Network Often results in Systems remain exposed [1]. Modification numerous systems unchanged. modifications. Large companies have important data and one of Exploit Developing and Product vendor Development their concerns is to protect the data. The penetration maintaining an develops and and test tests security mechanisms of companies by Management exploit database is maintains all exploits. simulating multiple attacks. In the situations like new time-consuming and Exploits are infrastructure is added, Software is installed, System requires significant continually updated updates are applied, Security patches are applied and expertise. for maximum User policies are modified it is necessary to do Public exploits are effectiveness. penetration testing. Some of the principal reasons for suspect and can be Exploits are adopting penetration testing are Security Issues, unsafe to run. professionally Protect Information, Prioritize security risks and Re-writing and developed, thoroughly Financial Loss [2]. porting code is tested, and safe to run. necessary for cross- Exploits are written The penetration test can be done either manually or platform and optimized for a automatically. Manual penetration test requires a functionality. variety of platforms skilled and experienced tester team to control all and attack vectors. Cleanup Tester must Leading products offer things. They must be physically present at the test remember and undo comprehensive duration. Thus this is not an affordable option. all changes. cleanup with one click Automatic penetration test is a simple and safe way Backdoors can be left and never install to perform all tasks related to the penetration test. behind backdoors. Moreover, since most work is done automatically, it Reporting Requires significant Comprehensive effort, recording and history and findings is more economical in terms of time. Another collating of all results reports are advantage of this test is the ability to reuse the set manually. All reports automatically parameters for the test. In [3], a comparison is made must be generated by produced. Reports are between the two tests, as follows: hand. customizable. Logging/ Slow, cumbersome, Automatically records Auditing often inaccurate a detailed record of all process. activity. Training Testers need to learn Users can learn and non-standardized, ad- install in as little as hoc testing methods. one day. 108 Copyright (c) 2014 Advances in Computer Science: an International Journal. All Rights Reserved. ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 6, No.12 , November 2014 ISSN : 2322-5157 www.ACSIJ.org Penetration testing can be segregated into the stage, the more successful the next stages will be. following classes [4]: Attack visibility: Blue-teaming The second phase of this methodology is divided into or Red-teaming, and system access: Internal testing two categories: port scanning which obtains a list of or External testing. open ports and services running on each of them, and vulnerability scanning which is a process to Blue-teaming is done with the consent of an entire recognize weaknesses of desired services and organization. The information security team is fully applications. According to the results obtained in step aware of the testing requirements as well as resources 2 and knowing what ports are open, what services are needed. Blue-teaming is a more efficient way to running on this port and what vulnerabilities they perform testing as the system availability is not an have, one can attack the target. Maintaining access is issue and hence there is a considerable reduction in the last phase. Most accesses obtained in the attack the overall time for testing. The shorter test times phase are temporary, and are removed after mean lesser system idle time and reduced testing disconnection. In this phase, it is tried to maintain costs. Red-teaming refers to testing that is performed access. Although this reference ignored "reporting" in a stealth manner without the knowledge of IT staff as a step in the penetration test, it stated the last [4]. Upper-level management authorizes such an activity of a penetration test as reporting. According exercise. The objectives of the test are to judge the to [5], reporting should include details on how to strength of the network security, the awareness of IT perform the test, a summary of the found security organization, and its ability to follow the standard threats, cases the test does not cover, etc. protocols. The entire test is done without the support of the organization’s resources. Reconnaissance Scanning 2.2. Available methodologies and techniques Maintaining Access Exploitation A methodology is a scheme that is used to reach the Figure 1 - proposed methodology in [5] destination. Lack of use of a methodology for penetration test may lead to